咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是3131-3140 订阅
排序:
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论
Availability-Aware Virtual network Embedding for Multi-tier Applications in Cloud networks
Availability-Aware Virtual Network Embedding for Multi-tier ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Meng Shen Xu Ke Fuliang Li Fan Li Liehuang Zhu Lei Guan Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) P. R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology P. R. China Tsinghua University Beijing Beijing CN College of Information Science and Engineering Northeastern University P. R. China DNSLAB China Internet Network Iniormation Center Beijing P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab... 详细信息
来源: 评论
MF-PDP:MULTI-FUNCTION PROVABLE DATA POSSESSION SCHEME IN CLOUD computing
MF-PDP:MULTI-FUNCTION PROVABLE DATA POSSESSION SCHEME IN CLO...
收藏 引用
2014 IEEE 3rd International Conference on Cloud computing and Intelligence Systems
作者: Xiaojun Yu Qiaoyan Wen State key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing Topsec Network Security Technology Co.Ltd
This paper proposed a multi-function provable data possession(MF-PDP),which supports public verification,data dynamic,unlimited times verification and sampling *** detail design is provided and the theory analysis abo... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Program Crash Analysis Based on Taint Analysis
Program Crash Analysis Based on Taint Analysis
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Zhang Puhan Wu Jianxiong Wang Xin Zehui Wu China Information Technology Security Evaluation Center Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception an... 详细信息
来源: 评论
Improved OMP Selecting Sparse Representation Used with Face Recognition
Improved OMP Selecting Sparse Representation Used with Face ...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Jian Zhang Ke Yan Zhenyu He Bio-computing Research Center Shenzhen Graduate SchoolHarbin Institute of Technology Key Laboratory of Network Oriented Intelligent Computation
With the worldwide strengthening of anti-terrorism and other identity verification,the products based on face recognition are used in real life more and *** recognition as an important ways has become the focus of aca... 详细信息
来源: 评论
Image Classification Using Sparse Coding and Spatial Pyramid Matching
Image Classification Using Sparse Coding and Spatial Pyramid...
收藏 引用
2014 International Conference on e-Education,e-Business and Information Management(ICEEIM 2014)
作者: Xiaofang Wang Jun Ma Ming Xu School of Computer Science and Technology Shandong University Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan
Recently,the Support Vector Machine(SVM) using Spatial Pyramid Matching(SPM) kernel has achieved remarkable successful in image classification. The classification accuracy can be improved further when combining the sp... 详细信息
来源: 评论
A Collaborative Linear Discriminative Representation Classification Based Method for Face Recognition
A Collaborative Linear Discriminative Representation Classif...
收藏 引用
2014 International Conference on Artificial,Intelligence and Software Engineering(AISE 2014)
作者: Jian ZHANG Ke YAN Zhen-yu HE Yong XU Bio-computing Research Center Shenzhen Graduate School Harbin Institute of Technology Key Laboratory of Network Oriented Intelligent Computation
The face recognition biometric technology, as one of the main applications, has been researched and improved by more and more people. In recent years, linear sparse representation being advantageous in improving the c... 详细信息
来源: 评论
Image Compression Algorithm Based On Automatic Extracted ROI
Image Compression Algorithm Based On Automatic Extracted ROI
收藏 引用
The 2014 10th International Conference on Natural Computation (ICNC 2014) and the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014)(第十届自然计算和第十一届模糊系统与知识发现国际会议)
作者: Peilong Zhao Jiwen Dong Lei Wang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China
An region of interesting compression algorithm of still image is *** algorithm that is based on embedded block coding with optimized truncation(EBCOT)encodes the interested region of the *** to the character of image ... 详细信息
来源: 评论
Social evolutionary games
Social evolutionary games
收藏 引用
International Conference on Game Theory for networks, GameNets
作者: Jianye Yu Yuanzhuo Wang Xiao!ong Jin Xueqi Cheng CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
In this paper, we introduce a framework of social evolutionary games (SEG) for investigating the evolution of social networks. In a SEG, a coevolutionary mechanism is adopted by agents who aim to improve his short-ter... 详细信息
来源: 评论